A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


HARdy HAR HAR HAR: HAR File Collection and Analysis for Malware - Robert Simmons Derbycon 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

HARdy HAR HAR HAR: HAR File Collection and Analysis for Malware
Robert Simmons
Derbycon 2015

HAR files or HTTP Archives are a format for recording sessions between a browser and a web server. This type of file is a rarely used, but powerful tool for analyzing malicious links. Using Selenium's set of web browser automation tools, one can automate visiting an endless stream of links and save a HAR file record of each one. Since the HAR file is saved in JSON format, it is quite easy to work with and can be stored in ElasticSearch. Using Python and the haralyzer framework, network indicators of compromise can be extracted from the HAR file. In addition to network IOCs, the HAR file also may contain the payload binary in a base64 encoded format. Additionally, a HAR file can be replayed over and over with slight variations to circumvent common anti-analysis techniques. The beauty of this method over a PCAP is that it gives the researcher visibility inside of SSL/TLS connections due to the fact that the HAR file represents the data of the HTTP session before encryption occurs. This talk will cover the details of how a HAR file is structured. This includes highlighting specific components that would be of interest during analysis of a malicious link. It will also demonstrate how to setup a collection system based on Python, Selenium, Firefox, FireBug, and NetExport. Next, it will show step-by-step how to extract the network IOCs from the generated HAR file using a set of Python scripts and the open source haralyzer framework. Lastly, it will cover all the steps needed to extract and decode payload binaries so that they're ready for submission to an automated malware analysis system. The code for these scripts will be released at the end of the talk.

Robert Simmons is a Senior Threat Intelligence Researcher at ThreatConnect, Inc. With an expertise in building automated malware analysis systems based on open source tools, he has been tracking malware and phishing attacks and picking them apart for years. Robert is also the author of PlagueScanner, an open source virus scanner framework. Robert, also known as Utkonos, has a background in biology, linguistics, and Russian area studies. He has lived extensively in Russia and Ukraine and has been known to swear profusely and constantly in Russian.

@MalwareUtkonos

Back to Derbycon 2015 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast